Computer Forensics and Access Data’s Ultimate Tool Kit Presented by: Kaukab ZuberiVice Chairman KRYS Dustin HulburtSenior Trainer and Manager Acces Data.

Slides:



Advertisements
Similar presentations
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes.
Advertisements

Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Consumer Powers and Protections
2 Language of Computer Crime Investigation
Contents What is Forensic Accounting Nature of work of Forensic Accountants Need of Forensic accounting Activities of Forensic accountants Forensic Accountant…An.
Challenges facing law enforcement agencies in the fight against cybercrime.
What is Crime?.
Teaching Computer Forensics Using Student Developed Evidence Files Anna Carlin Cal Poly Pomona.
McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 The Role of Government.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
BE1200, Basic Engineering I: Quiz 9 Design in Engineering Ethic Team 3 Presents: Enron Case.
Computer Forensics 101 Essential Knowledge for 21 st Century Investigators with Case Studies Presented by Steve Abrams, M.S. Abrams Computer Forensics.
Indiana State University Forensic Accounting By Dr. Thomas D. Harris.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
Forensic Accounting. Agenda Definition History Skills Business scandals Cases.
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
Call The Police! Vickie L. Mickey, CT,CLHRP. White Collar Crime Edwin Sutherland coined this phrase in the late 1930’s. Usually non-violent crimes Commercial.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Guide to Computer Forensics and Investigations, Second Edition
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
UNIT 1 – LAW ENFORCEMENT Crime and Punishment. Criminal Justice  The purpose of Criminal Justice  To control crime  To prevent crime  To provide and.
ENFORCING THE RULES OF A NATION UNIT 1 – PART 2E.
‘The United Kingdom Anti-Fraud Policy - A Critical Review’ Wales Fraud Forum 2 nd Annual Conference Dr Nicholas Ryder Head of Commercial Law Research Unit.
Computer Forensic Technician and Digital Data Recovery You can hit delete, but it’s not gone.
Fraud and Forensic Auditing Chapter Ten. Definition of Fraud “…any act involving the use of deception to obtain an illegal advantage.” (ISACA Irregularities.
 An orderly analysis, investigation, inquiry, test, inspection, or examination along a “paper trail” in the search for fraud, embezzlement, or hidden.
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
WHITE COLLAR CRIME Lecture 12: Policing and Regulating White Collar Crime.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 1 Computer Forensics and Investigations as a Profession.
June, 2013 MINISTRY OF PUBLIC ADMINISTRATION 1 MÉXICO.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
The FBI What the Federal Bureau of Investigation is TODAY.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Class Name, Instructor Name Date, Semester Criminology 2011 Chapter 13 WHITE-COLLAR AND ORGANIZED CRIME.
SECI Center: A Regional Tool in Combating Transborder Organized Crime and Terrorism UNECE – OSCE workshop on “The Economic Dimension of Security in Europe:
Social Consequences of Inequality Roderick Graham Fordham University.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
MOSCOW, NOVEMBER 12 – 14, THE RESEARCH 1.Respondents 8 respondents from SAI Indonesia : auditor, investigator, R &D 2.Time 3 weeks (Sept to Oct.
WHITE COLLAR CRIME Lecture 13: Policing & Regulating White Collar Crime.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Finance & Finance Law. What is finance? Finance describes the act of providing money, capital or other financial resources to assist in facilitating a.
Introduction to Forensic Science and the Law Physical science unit Chemistry Physics Geology Biology unit Firearms and ballistics unit Document examination.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Computer Forensics Kelsey Bretz. Overview Introduction What happens when a file is deleted Typical Computer Forensic Investigations Who uses Computer.
Business Computer Applications I Business Computer Applications II Accounting Principles I Accounting Principles II Business Law (offered 2017) Intro to.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Electronic Crime: Incident Reporting and Forensics Between Law Enforcement and Private Industry D/Sgt. Michael Harrington CEECS, CFCE, EnCE Michigan State.
Investigations 2016 First semester [ 12 week ]-Forensic Analysis of the Windows 7 Registry.
CRIMINAL LAW 1. Ahmed T. Ghandour.. CRIMES OF POWERFUL.
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
Database Encryption Market to Global Analysis and Forecasts by Types, End User and Deployment Type No of Pages: 150 Publishing Date: Feb 2017 Single.
Global Hardware Encryption Market Risk Analysis, Competitor Analysis, Choice Modelling, Trends and Forecast by 2022 Phone No.: +1 (214)
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Presented by Steve Abrams, M.S. Charleston, SC / Long Island, NY
UNIT IV – Legislative and Executive Branches
Global Digital Forensics Market Research Digital Forensics Market, Size, Share, Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast.
Chapter 10 White-Collar and Organized Crime
Crime Lab Agencies.
Ad Hoc Phase Structured Phase Enterprise Phase
South East Europe Implementing and Enforcing International Standards for Financial Reporting and Auditing 2/25/2019 by: John R. Rieger CPA.
Crime Lab Agencies.
GLOBAL DIGITAL FORENSICS MARKET 2017 – 2025 Published by :Accurize Market Research Pvt. Ltd. Copyright © 2019 Accurize Market Research
Introduction to Digital Forensics
Presentation transcript:

Computer Forensics and Access Data’s Ultimate Tool Kit Presented by: Kaukab ZuberiVice Chairman KRYS Dustin HulburtSenior Trainer and Manager Acces Data

White Collar Crimes Fraud—the art of deliberate deception for unlawful gain—is as old as history; the term "white-collar crime" was reportedly coined in 1939 by Professor Edwin Sutherland. Violations of the criminal law committed by a person of respectability and high social status in the course of his or her occupation. White Collar Crimes range from Financial Statement Fraud to Anti Money Laundering, Corruption and Computer Fraud. In US white collar crimes cost approx. 6% of the corporate revenue which is equal to $650 Billion annually.

Difference between Internal Auditor and Fraud Investigator Auditors work with a general focus on implementation. Auditors approach the audit with professional skeptism. However, a suspicion of fraud may not be present at that the time of audit. In various situations auditors may discover fraud. Fraud Investigators find themselves in a situation where a fraud is being commited by someone who has successfully beaten the system. Fraud Investigators are hired when a suspicion of fraud is present. Fraud Investigators concentrates on finding solid evidence of fraud

Challenges Faced by Fraud Investigators With more reliance on digital media, evidence is now available in digital format. Investigations now involve terabytes of data. Most Hard Drives now contains in excess of 1 million. Digital evidence can be found in various sources like USB Drives, PDAs, Smart Phones etc... Digital evidences can be encrypted and you need specialized tools to decrypt them. Digital evidence can be hidden in other files which are encrypted. In Turkey most of the large enterprises do not have investigation department instead they rely on internal audit department to conduct investigation. In Turkey most of the large enterprises do not have digital media usage policy. Fatih the Fraud Investigator

What is Computer Forensics Computer Forensics is… The examination of hardware or software in the pursuit of evidence to disprove or prove an allegation.

4 Area of Forensics 1. Evidence Collection 2. Evidence Preservation 3. Analysis 4. Reporting

KRYS Advantage KRYS is among the few, if not the only, company in Turkey to offer tools, trainings and investigative solutions in: 1.Hard Disk and Windows Forensics 2.HandHeld Forensics 3.Wireless Forensics 4.Stegnography We provide these solutions in associations with Access Data, Paraben Corporation, AirCapture and Backbone Security.

AccessData Advantage AccessData, a pioneer in the digital forensic industry, provides investigators with intuitive tools that seamlessly integrate for the reading, acquisition, decryption, analysis and reporting of digital evidence. AccessData has been the choice of leading law enforcement agencies and those in the corporate industry since its inception in 1987.

Clients of AccessData Federal Investigation Bureau (FBI) US Secret Service Security Exchange Commission (SEC) Drugs Enforcement Agency (DEA) Major Banks of USA Microsoft Corporation Law Enforcement Agencies in Europe, Asia, South America and Middle East Federal Police in Turkey Turkish Airforce etc.